WO1996000963A1 - Method and apparatus for copy protection for various recording media - Google Patents

Method and apparatus for copy protection for various recording media Download PDF

Info

Publication number
WO1996000963A1
WO1996000963A1 PCT/US1995/008324 US9508324W WO9600963A1 WO 1996000963 A1 WO1996000963 A1 WO 1996000963A1 US 9508324 W US9508324 W US 9508324W WO 9600963 A1 WO9600963 A1 WO 9600963A1
Authority
WO
WIPO (PCT)
Prior art keywords
signal
data
key
encryptor
copy
Prior art date
Application number
PCT/US1995/008324
Other languages
French (fr)
Inventor
John O. Ryan
Original Assignee
Macrovision Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Macrovision Corporation filed Critical Macrovision Corporation
Priority to JP50346896A priority Critical patent/JP4023818B2/en
Priority to DE69522328T priority patent/DE69522328T2/en
Priority to EP95925437A priority patent/EP0767957B1/en
Priority to AU29568/95A priority patent/AU695097B2/en
Priority to AT95925437T priority patent/ATE204670T1/en
Priority to DK95925437T priority patent/DK0767957T3/en
Publication of WO1996000963A1 publication Critical patent/WO1996000963A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8358Generation of protective data, e.g. certificates involving watermark
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00094Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
    • G11B20/00123Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers the record carrier being identified by recognising some of its unique characteristics, e.g. a unique defect pattern serving as a physical signature of the record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00217Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
    • G11B20/00246Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is obtained from a local device, e.g. device key initially stored by the player or by the recorder
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00485Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
    • G11B20/00492Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
    • G11B20/00536Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted wherein encrypted content data is subjected to a further, iterated encryption, e.g. interwoven encryption
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00572Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium
    • G11B20/00586Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium said format change concerning the physical format of the recording medium
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00681Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which prevent a specific kind of data access
    • G11B20/00695Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which prevent a specific kind of data access said measures preventing that data are read from the recording medium
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/60Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
    • G06F7/72Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
    • G06F7/724Finite field arithmetic
    • G06F7/725Finite field arithmetic over elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/605Copy protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91307Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
    • H04N2005/91342Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being an authentication signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91357Television signal processing therefor for scrambling ; for copy protection by modifying the video signal
    • H04N2005/91364Television signal processing therefor for scrambling ; for copy protection by modifying the video signal the video signal being scrambled

Definitions

  • the optical compact disc is universally recognized as a superb medium for storage of digital data. Its high packing density, low manufacturing cost and relative immunity to mishandling are unmatched by other media.
  • the success of the CD as a carrier of high fidelity audio is likely to be repeated in the realm of Multimedia, where the technology has been adapted to the broader task of storing digitized audio, video and alphanumeric information for a variety of purposes, conforming to a plethora of standards such as CD-ROM, CD-Video, CD-I, etc.
  • CD ROM software copyright owners have not had to contend with the rampant piracy (unauthorized copying) that afflicts the videocassette and audiocassette media.
  • the fundamental problem solved by this invention is to ensure that consumers can only enjoy a software manufacture's products by playing legitimately manufactured CDs.
  • One approach to his piracy problem would be the inclusion of special anti-copy circuitry within CD-recorders, mandated by general agreement between the manufacturers, similar to the Serial Copy Management System (SCMS) developed for the Digital Audio Tape (DAT) medium. With this scheme the CD-recorder would look for a special copy-prohibit instruction in the digital data and on finding it, would stop recording.
  • SCMS Serial Copy Management System
  • DAT Digital Audio Tape
  • CD-recorder manufactures include the necessary detection circuitry in their products. Some manufacturers may not comply, perhaps in the expectation of increasing their market share. The presence of even a small percentage of non-complying machines in the marketplace could jeopardize the viability of this type of copy-protection scheme. For the foregoing reasons, there is a need for a copy-protection system for the compact disc medium that provides a high level of protection to software rights owners, that is immune to black boxes and that is not compromised by the refusal of a few hardware manufacturers to comply with the standard.
  • a Conditional Play System provides copyright protection for previously recorded material on various media, for example compact disc media. Since the invention to be described is applicable to many different media and one of average skill in the art could readily adapt the teachings of this invention to other media, the description which follows will describe its application to the compact disk medium only.
  • the Conditional Play System does not attempt to prevent CD-recorders from copying the data from protected CDs. Instead, it is a method by which CD-players can determine whether a particular CD is a legitimate original or an illicit copy. If legitimate, the player plays the CD normally. If not, the player shuts down and may display an appropriate copyright warning message.
  • an Authenticating Signature is impressed on the disc in a manner that cannot be read by a CD-player's normal optical pickup, but which can easily be detected by other means.
  • the nature of this Authenticating Signature is such that it is faithfully transferred to all production disks made from this master.
  • the copy may contain a faithful replica of the disk's program data, but the Authenticating Signature is not transferred to the copy. All CD-players conforming to this copy protection standard would include a subsystem to search for the Authenticating Signature. If the signature is not found, the CD-player will not play the disk.
  • the Authenticating Signature is preferably impressed on the master disk by radially position modulating the writing head that creates the master disk by a few tens of namometers peak-to-peak about the head's normal position. This Authenticating Signature can then be read in the CD-player with a minimal increase in player complexity by taking advantage of the player's existing radial tracking servo system, as will now be described.
  • the optical reading head is maintained on track by a sophisticated error detectection systems, as a normal part of the player's function. If, for example, the head moves slightly toward one or other side of the track, or the track moves from under the head due to an off center spindle, an error is detected and, after amplification, is applied to the radial actuator to re-center the head of the track. Since the optical reading head must also track a deliberately induced radial position-modulation defining an Authenticating Signature, this error voltage therefore contains a signal component corresponding to this, along with other signals corresponding to elliptical errors and the like. Therefore, by appropriate processing of this error voltage, the Authenticating Signature can be detected.
  • the position-modulation signal may be a simple sinusoid of frequency such that either an integral number of cycles is impressed during each revolution of the disk, or one complete cycle is impressed during an integral number of revolutions of the disk. In either case, extraction of the Authenticating Signature from the various other tracking error signals is simplified.
  • a relevant type of abnormal scanning is described in US Patent 5,247,507 by Morimoto (incorporated by reference) that describes a wobble of the normal tracking signal causing the tracking to meander in a sinusoidal path about a mean frequency.
  • a common element of all three Conditional Play Systems is the use of the special Authenticating Signature described above, which is impressed on legitimately manufactured CDs or other media, in a manner such that this Authenticating Signature is not part of the recorded "program" signal and is therefore not passed on to an illicit copy.
  • the first of these Conditional Play Systems requires that all CD players conforming to the particular standard in question - CD-ROM, for example - must look for Authenticating Signature on each individual CD to be played.
  • the CD player's control system would be designed to stop playing the CD if the Authenticating Signature were missing. Since, as stated earlier, an illicit copy of a CD would not have the Authenticating Signature, such copies would in effect be useless.
  • CDs to be copy-protected would contain a special instruction to tell all CD-players to look for the Authenticating Signature and to not play such CDs in the absence thereof.
  • the instruction could be recorded, for example, on the initialization section of the CD - the part normally reserved for non-program information.
  • the instruction would be acted upon by a special sub-system in all compliant CD-players. Thus, only originals of copy-protected CDs could be played - illicit copies would be rejected.
  • This instruction would be omitted from CDs of programs which did not require copy-protection and for such programs both original CDs and copies thereof would play normally. In this manner copy-protection could be offered on a program-by-program basis through the use or non-use of this "Look For An Authenticating Signature And Play Only If Found" instruction.
  • this second Conditional Play System allows the copy-protection feature to be offered on a program-by-program basis, it could in principle be compromised by special black boxes connected in the signal line between the CD-player and the CD-recorder. These black boxes would search for this "Look For — " instruction in the data stream from the CD-player and remove or modify it so that the resultant illicit copy would not trigger the authenticating procedure in CD-players.
  • PCPS Programmable Conditional Play System
  • Fig. 1 is a block diagram of the mastering process hardware incorporating some elements of the invention
  • Fig. 2 is a block diagram of the compact disk playback device incorporating further elements of the invention.
  • the present invention relates to a method and apparatus for copy-protecting various program distribution media, such as the compact disk medium.
  • This invention is applicable to all disk media and the principles may be extended by one of ordinary skill in the art to other media such as magnetic tape.
  • the invention offers a high level of protection to software rights owners, is immune to black boxes and will not be compromised by the refusal of a few hardware manufacturers to comply with the standard.
  • the most common form of data encryption uses the same key to encrypt and decrypt the data.
  • the key is preferably a very large randomly generated number that is changed from time-to-time.
  • the key might be a number such as 349,247,839,636,290,351,673. This number (the key) would normally be kept secret to ensure system integrity.
  • the need to keep the key secret is a major disadvantage of symmetrical encryption systems.
  • the commonly used DES algorithm is an example of a symmetrical encryption system in which digital words, arranged in 64 bit blocks, are encrypted using a 56 bit key.
  • Asymmetrical encryption systems use two different keys, which we may call P and Q.
  • P is used for encryption
  • Q is used for decryption.
  • An important advantage of asymmetrical systems is that a knowledge of the key Q used for decryption is insufficient to allow messages to be encrypted.
  • RSA RSA Data Security Inc.
  • the security of this system rests on the tenet that it is computationally difficult to calculate P from a knowledge of Q.
  • the computation involves factoring extremely large numbers which may contain upwards of 500 digits.
  • the more digits in the keys P and Q the longer the factoring procedure takes.
  • the sizes of the keys are chosen to reduce the possibility of factoring to acceptable levels during the life of the product, with due allowance for anticipated increases in computing power.
  • a first embodiment of the PCPS encompasses a portion of a disk mastering device as in Figure 1 and another portion in a CD-player, as in Figure 2.
  • the PCPS Disk Mastering facility includes a copy protection recording apparatus 10 that accepts a "clear" (unencrypted) digital data stream from the conventional source, input terminal 21, that is inputted to both Symmetrical Encryptor 22 and an off position of one pole S la of an operator controlled double pole single throw control switch, 24. By appropriately setting switch 24, an operator controls whether the CDs to be manufactured from the program input on line 21 will be copy protected or not.
  • Symmetrical Encryptor 22 also receives key K on line 23, a first key signal, from key source 33.
  • Symmetrical Encryptor 22 is an encrypted version of the clear digital data stream input on line 21.
  • the type of encryption algorithm used by 22 and the nature of key K will be described later. To understand the invention it is sufficient to know that encryptor 22 modifies the clear data on line 21 according to some formula determined by key K.
  • the output terminal of Symmetrical Encryptor 22 is coupled to the second input of switch SI a.
  • the output of S la is connected to the input of Asymmetrical Encryptor 25, part of a public key system.
  • the encrypting key P of the public key pair P, Q must be a closely guarded secret.
  • key P is preferably stored in a volatile memory in key source 27.
  • This volatile memory may be within a physical enclosure that is protected in such a manner that an unauthorized attempt to read key P causes this memory to be erased and shuts down the system.
  • Physical security systems capable of accomplishing this are well known in the art and need not be elaborated on herein.
  • Asymmetrically Encrypted Data on line 28 from Asymmetrical Encryptor.25 are connected to the data input portion of an otherwise conventional disc mastering device.
  • An Authentication Signature Generator 29 generates an Authenticating Signature 31 the nature and purpose of which was described earlier.
  • Line 31 is connected to one input of Sib, the second pole of copy protection control switch 24.
  • the other terminal of Sib has no signal applied and may be conventionally tied to ground.
  • Operator controlled Switch Sib connects Authenticating Signature 31 to the radial actuator via line 32 only when the copy-protection mode is selected.
  • the companion copy-protection apparatus 40 contained within the CD-player is shown in Figure 2.
  • Program data from the CD on line 41, appropriately decoded and error corrected, are inputted to Asymmetrical Decryptor 42 which is driven by the second key Q of the aforementioned public key pair P, Q.
  • Key Q is provided on line 44 from key source 43.
  • Asymmetrically Decrypted Data on line 45 is coupled to one input of switch 55, and also to the input of Symmetrical Decryptor 46.
  • Symmetrical Decryptor 46 just performs the inverse of Symmetrical Encryptor 22 in Figure 1, under control of the same key K which is provided on line 48 from key source 49.
  • Symmetrical Decryptor 46 on line 56 is coupled to a second input of Switch 55.
  • the output of Switch 55 on line 54 is coupled to the remaining conventional data processing portion of the CD-player.
  • Keys Q and K are permanently stored in the CD-player in some convenient read only memory and no special security precautions are necessary. As will be explained later, a knowledge of these keys is of little help to a would-be pirate attempting to compromise this copy-protection scheme.
  • the error signal from the CD-player's radial tracking servo amplifier is input on line 51 to Authenticating Signal Detector 52. As explained earlier, this signal will have a component corresponding to the Authenticating Signature.
  • Detector 52 is designed to generate a binary output on line 53 corresponding to the presence or absence of the Authenticating Signature at its input. For example this output may be a logical 1 in the presence of the Authenticating Signature and a logical 0 in its absence.
  • the logic levels are chosen so as to cause switch 55 to select the singly decrypted input from line 47 in the absence of an Authenticating Signature and the doubly decrypted input from line 56 when the Authenticating Signature is detected.
  • Authenticating Signature causes switch S to incorrectly select the singly decrypted data.
  • the partially decrypted data on line 54 will prohibit the disk from playing normally.
  • a pirate must do one of the following: 1. Convert the doubly encrypted program data recorded on all copy-protected disks to the singly encrypted format required by CD-players when the Authenticating Signature is missing. To do this, the pirate must obtain the Secret Key P used in the disk mastering process, which as explained earlier can be closely guarded within a sealed, booby trapped unit located at the disk mastering plant. The pirate can readily access the doubly encrypted off disk data inside a CD-player. He may also access the partially decrypted and fully decrypted (clear) program data, along with keys K and Q, inside a CD-player. However, the essence of the asymmetrical encryption method is such that a pirate still does not have enough information to deduce the secret key P needed to generate the required singly encrypted program data. This compound encryption scheme thus permits selective protection of programs and is immune to black box attack.
  • the signature may be in the form of an impulse function (rather than a simple sinusoid), such that the radial servo of a commercially available CD-recorder might not be able to track it.
  • an impulse function rather than a simple sinusoid
  • a further simplification in the reduction to practice of this invention is possible by performing the various encryption and decryption procedures on a small subset of the program data, rather on the entire data stream. This is advantageous because it reduces the rate, in bits per second, at which the asymmetrical decryption subsystem needs to operate, thereby allowing the use of less expensive processors.
  • An alternative and equally effective method for authenticating a disk is to couple one or more specific data blocks with specific radial distances from the center of the disk being mastered.
  • the writing head can be moved from the center at rates that vary randomly between nominal speed and fractionally more than nominal speed.
  • the starting position of the head may also be displaced a random distance from the nominal starting position.
  • the distance of particular data blocks from the disk's center and from each other will then be a function of these random variables.
  • the values of these random variables are arranged to vary from program-to-program.
  • the distance of one or more data blocks from disk center is now encrypted under the private key of an asymmetrical encryption system and the encrypted data are recorded on the disk as part of the system data.
  • Each companion CD-player would be provided with a calibrated radial servo system, such that the distance of the reading head from disk center would be available as a digital word within the player.
  • the encrypted radial distance data is decrypted using the public key Q of the key pair P, Q, which is stored in a memory in the CD-player. These decrypted data are temporarily stored in random access memory.
  • the actual distance of the aforementioned data blocks is compared with the decrypted value of what the distance should be. Any difference in the computed distance deemed to be greater than that attributable to tolerance errors is presumed to being due to the CD being an illicit copy.
  • the CD-player stops playing and perhaps displays a copyright message.
  • another embodiment uses a measurement of the radial velocity of the reading head at various data block locations.
  • This approach has the advantage of not requiring the distance between the reading head and the disc center to be accurately known. Instead it relies on a relative measure of the head's radial velocity at various locations, which is more readily available from the tracking control system.
  • Authenticating Signature 32 could be added to the control track of the tape.

Abstract

A method and apparatus for copyright protection for various recording media such as compact discs (CDs) uses a combination of symmetrical and asymmetrical data encryption to permit the player to handle either copy-protected or non-copy-protected media, in a manner that is extremely difficult to compromise. Coupled with the combination of encrypting methods, an Authenticating Signature is recorded on the media only when copy-protection is required. The nature of this Authenticating Signature is such that it will not be transferred to illicit copies made on CD recorders. When either an original protected or an original non-protected disk is played, the presence or absence of the Authenticating Signature cause the player to correctly decrypt the program data. All original CDs therefore play normally. When a copy of a non-protected CD is played, the absence of the Authenticating Signature also causes the player to correctly decrypt the program data. However, when a copy of a protected CD is played, the absence of the Authenticating Signature causes the player to generate false data which prohibits the disk from playing normally.

Description

METHOD AND APPARATUS
FOR COPY PROTECTION
FOR VARIOUS RECORDING MEDIA
BACKGROUND
The optical compact disc (CD) is universally recognized as a superb medium for storage of digital data. Its high packing density, low manufacturing cost and relative immunity to mishandling are unmatched by other media. The success of the CD as a carrier of high fidelity audio is likely to be repeated in the realm of Multimedia, where the technology has been adapted to the broader task of storing digitized audio, video and alphanumeric information for a variety of purposes, conforming to a plethora of standards such as CD-ROM, CD-Video, CD-I, etc. To date, CD ROM software copyright owners have not had to contend with the rampant piracy (unauthorized copying) that afflicts the videocassette and audiocassette media. This is almost entirely due to the large capital investment costs associated with mastering and replicating CDs, which creates substantial financial barriers to piracy. However, compact disc recording machines capable of making perfect copies of data from pre-recorded CDs are now available for professional users for about two thousand dollars and it is very likely that a few years from now, consumer affordable player-recorders will be widely available. This will create a serious conflict between software producers' needs to sell their product for $50+ to make a profit, and the consumers' resulting ability to make a perfect copy for the price of a blank disc, projected to be in the $10 to $20 range soon. The problem is likely to be much more severe than the piracy afflicting the video business, because, while few people want to watch a movie more than once, many Multimedia software products are intended to be used repeatedly, so that ownership rather than rental is likely to be the norm.
The fundamental problem solved by this invention is to ensure that consumers can only enjoy a software manufacture's products by playing legitimately manufactured CDs. One approach to his piracy problem would be the inclusion of special anti-copy circuitry within CD-recorders, mandated by general agreement between the manufacturers, similar to the Serial Copy Management System (SCMS) developed for the Digital Audio Tape (DAT) medium. With this scheme the CD-recorder would look for a special copy-prohibit instruction in the digital data and on finding it, would stop recording. However, such a system offers very limited protection. Even when the SCMS system was first proposed for the DAT medium, it was fully appreciated that it presented little protection from professional or even amateur pirates, who, knowing the data format, could, and subsequently did, build inexpensive "black boxes" (electronic circuits) to remove the copy-prohibit instruction thereby enabling the recorders to make unlimited copies.
The applicant believes that all anti-copy systems relying on copy-prohibit instructions inserted in the data stream can be defeated by black boxes of the same order of complexity and cost at that of the circuitry within the CD-recorder that looks for these instructions. Such systems are therefore of limited effectiveness. The black box would be connected in line between a CD-player and a CD-recorder and would look for the special copy-prohibit instructions in the data stream and simply remove or modify these instructions. It is to be expected,therefore,that if this kind of anti-copy system were adopted, inexpensive black boxes would proliferate. A further difficulty with this approach to copy protection is the need to ensure that all
CD-recorder manufactures include the necessary detection circuitry in their products. Some manufacturers may not comply, perhaps in the expectation of increasing their market share. The presence of even a small percentage of non-complying machines in the marketplace could jeopardize the viability of this type of copy-protection scheme. For the foregoing reasons, there is a need for a copy-protection system for the compact disc medium that provides a high level of protection to software rights owners, that is immune to black boxes and that is not compromised by the refusal of a few hardware manufacturers to comply with the standard.
SUMMARY OF THE INVENTION
According to the invention, a Conditional Play System provides copyright protection for previously recorded material on various media, for example compact disc media. Since the invention to be described is applicable to many different media and one of average skill in the art could readily adapt the teachings of this invention to other media, the description which follows will describe its application to the compact disk medium only.
The invention overcomes the disadvantages of the above-described system. The Conditional Play System does not attempt to prevent CD-recorders from copying the data from protected CDs. Instead, it is a method by which CD-players can determine whether a particular CD is a legitimate original or an illicit copy. If legitimate, the player plays the CD normally. If not, the player shuts down and may display an appropriate copyright warning message.
During manufacture of the master disk, an Authenticating Signature is impressed on the disc in a manner that cannot be read by a CD-player's normal optical pickup, but which can easily be detected by other means. The nature of this Authenticating Signature is such that it is faithfully transferred to all production disks made from this master. However, if an illicit κ copy of a production disk is made using a CD-recorder, the copy may contain a faithful replica of the disk's program data, but the Authenticating Signature is not transferred to the copy. All CD-players conforming to this copy protection standard would include a subsystem to search for the Authenticating Signature. If the signature is not found, the CD-player will not play the disk.
For compact disk applications, the Authenticating Signature is preferably impressed on the master disk by radially position modulating the writing head that creates the master disk by a few tens of namometers peak-to-peak about the head's normal position. This Authenticating Signature can then be read in the CD-player with a minimal increase in player complexity by taking advantage of the player's existing radial tracking servo system, as will now be described.
In all CD-players, the optical reading head is maintained on track by a sophisticated error detectection systems, as a normal part of the player's function. If, for example, the head moves slightly toward one or other side of the track, or the track moves from under the head due to an off center spindle, an error is detected and, after amplification, is applied to the radial actuator to re-center the head of the track. Since the optical reading head must also track a deliberately induced radial position-modulation defining an Authenticating Signature, this error voltage therefore contains a signal component corresponding to this, along with other signals corresponding to elliptical errors and the like. Therefore, by appropriate processing of this error voltage, the Authenticating Signature can be detected. The position-modulation signal may be a simple sinusoid of frequency such that either an integral number of cycles is impressed during each revolution of the disk, or one complete cycle is impressed during an integral number of revolutions of the disk. In either case, extraction of the Authenticating Signature from the various other tracking error signals is simplified. A relevant type of abnormal scanning is described in US Patent 5,247,507 by Morimoto (incorporated by reference) that describes a wobble of the normal tracking signal causing the tracking to meander in a sinusoidal path about a mean frequency.
Clearly this copy protection system cannot be compromised by any external black box connected between a CD-player's signal output and a CD-recorder's signal input, since the Authenticating Signature is not transferred to the recorder. Neither is the system compromised if a few manufacturers choose not to build the authenticating system into their CD-players, because pirate disk makers would have to label their products as capable of being played only on the limited set of non-complying CD-players on the market. The pirate disk maker would in effect be advertising the illegality of their product and inviting prosecution. Three forms of such a Conditional Play System are described herein. A common element of all three Conditional Play Systems is the use of the special Authenticating Signature described above, which is impressed on legitimately manufactured CDs or other media, in a manner such that this Authenticating Signature is not part of the recorded "program" signal and is therefore not passed on to an illicit copy. The first of these Conditional Play Systems requires that all CD players conforming to the particular standard in question - CD-ROM, for example - must look for Authenticating Signature on each individual CD to be played. The CD player's control system would be designed to stop playing the CD if the Authenticating Signature were missing. Since, as stated earlier, an illicit copy of a CD would not have the Authenticating Signature, such copies would in effect be useless. Effective copy-protection is therefore accomplished even though the illicit copy may contain a perfect replica of the program information. The disadvantage of this first system is that all legitimate CDs which are intended to be played on these special CD-players must have an Authenticating Signature added. This system is therefore only suitable for closed systems wherein a systems controller can mandate that all CDs be copy-protected. However, it is desirable from a commercialization viewpoint to be able to offer and charge for copy-protection on a program-by-program basis. The second and third Conditional Play Systems to be described below have this capability.
In a second Conditional Play System, CDs to be copy-protected would contain a special instruction to tell all CD-players to look for the Authenticating Signature and to not play such CDs in the absence thereof. The instruction could be recorded, for example, on the initialization section of the CD - the part normally reserved for non-program information. The instruction would be acted upon by a special sub-system in all compliant CD-players. Thus, only originals of copy-protected CDs could be played - illicit copies would be rejected. This instruction would be omitted from CDs of programs which did not require copy-protection and for such programs both original CDs and copies thereof would play normally. In this manner copy-protection could be offered on a program-by-program basis through the use or non-use of this "Look For An Authenticating Signature And Play Only If Found" instruction.
However, although this second Conditional Play System allows the copy-protection feature to be offered on a program-by-program basis, it could in principle be compromised by special black boxes connected in the signal line between the CD-player and the CD-recorder. These black boxes would search for this "Look For — " instruction in the data stream from the CD-player and remove or modify it so that the resultant illicit copy would not trigger the authenticating procedure in CD-players.
A third Conditional Play System, called the Programmable Conditional Play System (PCPS) overcomes the disadvantages of the above described systems and provides a copy- protection scheme which can be activated on a program-by-program basis and which is also highly resistant to black box attack.
The description below describes one embodiment of the Programmable Conditional Play system that uses a combination of symmetrical and asymmetrical encryption techniques to achieve its goal. BRIEF DESCRIPTION OF THE DRAWINGS
Fig. 1 is a block diagram of the mastering process hardware incorporating some elements of the invention; and Fig. 2 is a block diagram of the compact disk playback device incorporating further elements of the invention. DETAILED DESCRIPTION OF THE INVENTION
The present invention relates to a method and apparatus for copy-protecting various program distribution media, such as the compact disk medium. This invention is applicable to all disk media and the principles may be extended by one of ordinary skill in the art to other media such as magnetic tape. The invention offers a high level of protection to software rights owners, is immune to black boxes and will not be compromised by the refusal of a few hardware manufacturers to comply with the standard.
As mentioned earlier, it is desirable to be able to offer copy-protection to copyright holders on a program-by-program basis and to receive a per-program fee or a per-disk fee in return. This is accomplished in the Programmable Conditional Play System using a combination of symmetrical and asymmetrical (also known as public-key) data encryption to permit the CD-player to handle either copy protected or non-copy-protected disks in a manner that is extremely difficult or prohibitively expensive and time consuming to compromise, using black boxes.
A summary of conventional encryption methods is useful for a fuller understanding of this invention. The most common form of data encryption, called symmetrical encryption, uses the same key to encrypt and decrypt the data. To guard against trial and error attempts at guessing the key, the key is preferably a very large randomly generated number that is changed from time-to-time. For example the key might be a number such as 349,247,839,636,290,351,673. This number (the key) would normally be kept secret to ensure system integrity. The need to keep the key secret is a major disadvantage of symmetrical encryption systems. The commonly used DES algorithm is an example of a symmetrical encryption system in which digital words, arranged in 64 bit blocks, are encrypted using a 56 bit key. 56 binary bits are equivalent to about 17 decimal digits. Asymmetrical encryption systems use two different keys, which we may call P and Q. One key P, is used for encryption and the other key Q, is used for decryption. An important advantage of asymmetrical systems is that a knowledge of the key Q used for decryption is insufficient to allow messages to be encrypted. Presently, one of the most secure algorithms for asymmetrical encryption is that designed by RSA Data Security Inc., (RSA) using the technology of U.S. Patent 4,405,829 by Rivest et al. The security of this system rests on the tenet that it is computationally difficult to calculate P from a knowledge of Q. The computation involves factoring extremely large numbers which may contain upwards of 500 digits. The more digits in the keys P and Q, the longer the factoring procedure takes. In practice, the sizes of the keys are chosen to reduce the possibility of factoring to acceptable levels during the life of the product, with due allowance for anticipated increases in computing power.
A first embodiment of the PCPS encompasses a portion of a disk mastering device as in Figure 1 and another portion in a CD-player, as in Figure 2. The PCPS Disk Mastering facility includes a copy protection recording apparatus 10 that accepts a "clear" (unencrypted) digital data stream from the conventional source, input terminal 21, that is inputted to both Symmetrical Encryptor 22 and an off position of one pole S la of an operator controlled double pole single throw control switch, 24. By appropriately setting switch 24, an operator controls whether the CDs to be manufactured from the program input on line 21 will be copy protected or not. Symmetrical Encryptor 22 also receives key K on line 23, a first key signal, from key source 33.
The output of Symmetrical Encryptor 22 is an encrypted version of the clear digital data stream input on line 21. The type of encryption algorithm used by 22 and the nature of key K will be described later. To understand the invention it is sufficient to know that encryptor 22 modifies the clear data on line 21 according to some formula determined by key K. The output terminal of Symmetrical Encryptor 22 is coupled to the second input of switch SI a. The output of S la is connected to the input of Asymmetrical Encryptor 25, part of a public key system.
To ensure the security of this Programmable Conditional Play System, the encrypting key P of the public key pair P, Q must be a closely guarded secret. To this end key P is preferably stored in a volatile memory in key source 27. This volatile memory may be within a physical enclosure that is protected in such a manner that an unauthorized attempt to read key P causes this memory to be erased and shuts down the system. Physical security systems capable of accomplishing this are well known in the art and need not be elaborated on herein.
Asymmetrically Encrypted Data on line 28 from Asymmetrical Encryptor.25 are connected to the data input portion of an otherwise conventional disc mastering device. An Authentication Signature Generator 29 generates an Authenticating Signature 31 the nature and purpose of which was described earlier. Line 31 is connected to one input of Sib, the second pole of copy protection control switch 24. The other terminal of Sib has no signal applied and may be conventionally tied to ground. Operator controlled Switch Sib connects Authenticating Signature 31 to the radial actuator via line 32 only when the copy-protection mode is selected.
The companion copy-protection apparatus 40 contained within the CD-player, is shown in Figure 2. Program data from the CD on line 41, appropriately decoded and error corrected, are inputted to Asymmetrical Decryptor 42 which is driven by the second key Q of the aforementioned public key pair P, Q. Key Q is provided on line 44 from key source 43. Asymmetrically Decrypted Data on line 45 is coupled to one input of switch 55, and also to the input of Symmetrical Decryptor 46. Symmetrical Decryptor 46 just performs the inverse of Symmetrical Encryptor 22 in Figure 1, under control of the same key K which is provided on line 48 from key source 49.
The output of Symmetrical Decryptor 46 on line 56 is coupled to a second input of Switch 55. The output of Switch 55 on line 54 is coupled to the remaining conventional data processing portion of the CD-player. Keys Q and K are permanently stored in the CD-player in some convenient read only memory and no special security precautions are necessary. As will be explained later, a knowledge of these keys is of little help to a would-be pirate attempting to compromise this copy-protection scheme. The error signal from the CD-player's radial tracking servo amplifier is input on line 51 to Authenticating Signal Detector 52. As explained earlier, this signal will have a component corresponding to the Authenticating Signature. Detector 52 is designed to generate a binary output on line 53 corresponding to the presence or absence of the Authenticating Signature at its input. For example this output may be a logical 1 in the presence of the Authenticating Signature and a logical 0 in its absence. The logic levels are chosen so as to cause switch 55 to select the singly decrypted input from line 47 in the absence of an Authenticating Signature and the doubly decrypted input from line 56 when the Authenticating Signature is detected.
We can now appreciate the operation of this Programmable Conditional Play System by examining its response under different circumstances.
• When an original copy-protected or non copy-protected disk is played, the presence or absence of the Authenticating Signature causes switch S to correctly select either the singly decrypted or the doubly decrypted data. The output of switch S will therefore be properly decrypted data. Consequently, all original disks will be played normally. • When a copy of a non copy-protected disk is played, the absence of the Authenticating
Signature also causes switch S to correctly select the singly decrypted data, again allowing such discs to play normally.
However, when an illicit copy of a copy-protected disk is played, the absence of the
Authenticating Signature causes switch S to incorrectly select the singly decrypted data. The partially decrypted data on line 54 will prohibit the disk from playing normally.
The security of the PCPS makes it very difficult if not impossible or uneconomical for a pirate to make playable copies of protected disks.
To make playable copies of copy-protected discs, i.e., to defeat this scheme, a pirate must do one of the following: 1. Convert the doubly encrypted program data recorded on all copy-protected disks to the singly encrypted format required by CD-players when the Authenticating Signature is missing. To do this, the pirate must obtain the Secret Key P used in the disk mastering process, which as explained earlier can be closely guarded within a sealed, booby trapped unit located at the disk mastering plant. The pirate can readily access the doubly encrypted off disk data inside a CD-player. He may also access the partially decrypted and fully decrypted (clear) program data, along with keys K and Q, inside a CD-player. However, the essence of the asymmetrical encryption method is such that a pirate still does not have enough information to deduce the secret key P needed to generate the required singly encrypted program data. This compound encryption scheme thus permits selective protection of programs and is immune to black box attack.
2. Add a viable Authenticating Signature to illicit copies as the disks are being recorded, so that compliant CD-players will play these disks normally. This is possible, but to do so the pirate needs to make major modifications to a CD-recorder to enable it to lay down radially position-modulated tracks. Such modifications are well beyond the capabilities of consumers and software dealers. However, it is unrealistic to insist that a well-financed pirate operation could not find a way to do it. There are various ways to make it more difficult for a pirate to "forge" an Authenticating Signature, but these all depend to greater or lesser extent on the exact capabilities of the radial servo system (if any) on available CD-recorders. For example, the signature may be in the form of an impulse function (rather than a simple sinusoid), such that the radial servo of a commercially available CD-recorder might not be able to track it. Of course, if we allow this mythical pirate unlimited financial resources, he could invest in a professional disk mastering system and make the necessary modifications.
As a practical matter however, the ability of this system and method to eliminate piracy at the consumer, dealer and technically knowledgeable professional level, should be extremely valuable.
If the public key algorithm available from RSA Data Security Inc. (RSA), is used for the symmetrical encryption and decryption in this application, it becomes possible to use an extremely simple symmetrical encryption and decryption algorithm without comprising security. Specifically this "algorithm" could simply invert any one bit of the data block or interchange any two bits. Formal key-controlled encryption and decryption systems as conventionally understood can thus be avoided in favor of simple complementary logical operations. Keys K as used in the mastering process and in the CD-player would therefore be unnecessary.
A further simplification in the reduction to practice of this invention is possible by performing the various encryption and decryption procedures on a small subset of the program data, rather on the entire data stream. This is advantageous because it reduces the rate, in bits per second, at which the asymmetrical decryption subsystem needs to operate, thereby allowing the use of less expensive processors.
An alternative and equally effective method for authenticating a disk, is to couple one or more specific data blocks with specific radial distances from the center of the disk being mastered.
As the master disk is being cut, the writing head can be moved from the center at rates that vary randomly between nominal speed and fractionally more than nominal speed. The starting position of the head may also be displaced a random distance from the nominal starting position. The distance of particular data blocks from the disk's center and from each other will then be a function of these random variables. The values of these random variables are arranged to vary from program-to-program. The distance of one or more data blocks from disk center is now encrypted under the private key of an asymmetrical encryption system and the encrypted data are recorded on the disk as part of the system data. When a CD-recorder makes a copy of such a disk, the distances of these data blocks from the CD's center on the copy differ from their distances on the original disk, because a commercially available CD-recorder's writing head is driven radially at a fixed speed.
Each companion CD-player would be provided with a calibrated radial servo system, such that the distance of the reading head from disk center would be available as a digital word within the player. When the CD is played, the encrypted radial distance data is decrypted using the public key Q of the key pair P, Q, which is stored in a memory in the CD-player. These decrypted data are temporarily stored in random access memory.
As the CD continues to play, the actual distance of the aforementioned data blocks is compared with the decrypted value of what the distance should be. Any difference in the computed distance deemed to be greater than that attributable to tolerance errors is presumed to being due to the CD being an illicit copy. The CD-player then stops playing and perhaps displays a copyright message.
As an alternative to using the distance of specific data blocks from the disc center and from each other as an indicator of a disc's authenticity, another embodiment uses a measurement of the radial velocity of the reading head at various data block locations. This approach has the advantage of not requiring the distance between the reading head and the disc center to be accurately known. Instead it relies on a relative measure of the head's radial velocity at various locations, which is more readily available from the tracking control system. While the above embodiments have described a Programmable Conditional Play System for a compact disc format, the principles are also applicable to a magnetic tape format. For such applications, Authenticating Signature 32 could be added to the control track of the tape. While the invention has been described in connection with preferred embodiments, it will be appreciated by those skilled in the art that various changes can be made without departing from its spirit. The coverage afforded applicant is defined by the claims and their equivalents.

Claims

CLAIMSI claim:
1. A method of providing copy-protection for a program distribution medium comprising the steps of: adding an authenticating signature to media to be copy-protected; passing program data through a first encryptor; passing said first encrypted program data from said first encryptor through a second encryptor; recording the data from the second encryptor on a media; detecting the authenticating signature in a media player; passing decoder data from said media through a first decryptor; passing said first decrypted data from said first decryptor through a second decryptor; selecting an output of said second decryptor when an authenticating signal is detected, and selecting an output of said first decryptor when an authenticating signature is not detected.
2. A method as recited in claim 1 wherein said first encryptor and said second decryptor are complementary.
3. A method as recited in claim 1 wherein said second encryptor and said first decryptor are complementary parts of an asymmetrical or public key encryption system.
4. A method as recited in claim 2 wherein said first encryptor is a device which inverts or interchanges one or more bits of the data block and said second decryptor performs the complementary logical operation.
5. A method for providing copy protection in a mastering process of a recording medium comprising the steps of: inputting a data stream generating a first key signal; coupling said first key signal to a symmetrical encryptor; coupling said data stream to said symmetrical encryptor; encrypting said data stream; coupling said symmetrical encryptor to a selector; coupling said data stream to said selector; generating a second key signal; coupling said second key signal to an asymmetrical encryptor; selecting whether said data stream or symmetrically encrypted data is coupled to said asymmetrical encryptor; asymmetrically encrypting data selected; coupling asymmetrical encrypted data to a data processing portion of a mastering device; generating an authenticating signature signal; and coupling said authenticating signature signal to a time base control mechanism of a disc mastering device when symmetrically encrypted data is coupled to said asymmetrical encryptor to modify said time base control mechanism according to said authenticating signature signal.
6. A method as recited in claim 5, wherein said recording medium is an optical compact disc.
7. A method as recited in claim 5, wherein said recording medium is a CD ROM disc.
8. A method as recited in claim 5, wherein said recording medium is a magnetic tape.
9. A method as recited in claim 5, wherein said first key signal is a random key.
10. A method as recited in claim 5, wherein said second key signal is a secret key.
11. A method as recited in claim 5, wherein said data stream is unencrypted.
12. A method for providing copy protection in a playback process of a previously recorded medium which may contain previously encrypted data in a playback device comprising the steps of: providing previously encrypted data from said previously recorded medium; generating a first key signal; coupling said first key signal to an asymmetrical decryptor; asymmetrically decrypting data from said previously recorded medium, this producing a first decrypted data stream; finding a second key signal from a key database; generating a second key signal; coupling said second key signal to a symmetrical decryptor; coupling said first decrypted data stream to said symmetrical decryptor; symmetrically decrypting said first decrypted data stream, thus producing a second decrypted data stream; providing a servo signal which may contain an authenticating signal; detecting a presence of said authenticating signal; creating a copy protection signal based upon detection of said authenticating signal; selecting said first decrypted data stream when a copy protection signal is not present; selecting said second decrypted data stream when said copy protection signal is present; and outputting selected data to a data processing portion of said playback device.
13. A method as recited in claim 12 wherein said previously recorded medium is a CD ROM disc.
14. A method as recited in claim 12 wherein said previously recorded medium is a compact audio disc.
15. A method as recited in claim 12 wherein previously recorded medium is a compact audio disc.
16. A copy protection recording apparatus for master recording on a recording medium comprising: an input terminal for receiving a digital data stream; a symmetrical encryptor; a first random key generator to provide a first key signal, said first key signal coupled to said symmetrical encryptor; an operator controlled switch thereby determines whether said digital data stream or output of said symmetrical encryptor is coupled to an asymmetrical encryptor; a second key generator to provide a second key signal, said second key signal being coupled to said asymmetrical encryptor; said asymmetrical encryptor being coupled to a data processing portion of a master recording device; when said operator controlled switch is in an off position said digital data stream is asymmetrically encrypted by said asymmetrical encryptor; an authenticating signature generator that generates an authenticating signature signal that indicates that a master recording is to be copy protected and said authenticating signature signal is coupled to a time base signal system; and wherein said authenticating signature signal is coupled to said time base signal system of said master recording device when said operator controlled switch is placed in an on position.
17. An apparatus as recited in claim 16 wherein said recording medium is a digital audio tape.
18. An apparatus as recited in claim 16 wherein said recording medium is a CD ROM disc.
19. An apparatus as recited in claim 16 wherein said recording medium is a compact audio disc.
20. An apparatus as recited in claim 16 wherein said time base signal system is a radial actuator system and said authenticating signature signal modulates a radial position of said radial actuator system during mastering.
21. An apparatus as recited in claim 20 wherein modulation of said radial actuator system comprises movement from a center of a disk being mastered at rates that vary randomly between a nominal speed and fractionally more than said nominal speed.
22. an apparatus for master recording copy protected material on a recording medium Comprising: means for coupling a digital data stream to a symmetrical encryptor; means for generating a first key signal; means for symmetrically encrypting said digital data stream using said first key signal; means for coupling data to an asymmetrical encryptor; means for selecting between said digital data stream and symmetrically encrypted data; means for generating a second key signal; means for asymmetrically encrypting selected data using said second key signal; means for coupling asymmetrically decrypted data to a data processing portion of a master recording device; means for generating an authentication signature signal to indicate that said digital data stream is to be copy protected; means for selecting between a copy protection mode and a non-copy protect mode; and means for affecting a time base system of said recording medium in response to said authentication signature signal.
23. An apparatus as recited in claim 22 wherein said first key signal is a random key.
24. An apparatus as recited in claim 22 wherein said second key signal is a secret key.
25. A copy protection apparatus for a playback device, comprising: means for coupling a decoded data signal to an asymmetrical decryptor; means for generating a first key signal; means for asymmetrically decrypting said decoder data signal by using said first key signal; means for generating a second key signal; means for coupling an asymmetrically decrypted data signal to a symmetrical decryptor; means for symmetrically decrypting asymmetrically decrypted data using said second key; signal to generate a clear data signal; means for selecting between asymmetrically decrypted data from said asymmetrical decryptor and symmetrically decrypted data from said symmetrical decryptor; means for detecting an authentication signature signal to indicate that said clear data signal is to be copy protected; and means for selecting between a copy protection mode and a non-copy protect mode for indicating whether said decoded data signal is copy protected or not copy protected.
PCT/US1995/008324 1994-06-29 1995-06-27 Method and apparatus for copy protection for various recording media WO1996000963A1 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
JP50346896A JP4023818B2 (en) 1994-06-29 1995-06-27 Method and apparatus for copy protection for various recording media
DE69522328T DE69522328T2 (en) 1994-06-29 1995-06-27 METHOD AND DEVICE FOR COPY PROTECTION FOR VARIOUS RECORDING MEDIA
EP95925437A EP0767957B1 (en) 1994-06-29 1995-06-27 Method and apparatus for copy protection for various recording media
AU29568/95A AU695097B2 (en) 1994-06-29 1995-06-27 Method and apparatus for copy protection for various recording media
AT95925437T ATE204670T1 (en) 1994-06-29 1995-06-27 METHOD AND DEVICE FOR COPY PROTECTION FOR VARIOUS RECORDING MEDIA
DK95925437T DK0767957T3 (en) 1994-06-29 1995-06-27 Method and apparatus for copy protection of various recording media

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US08/267,635 1994-06-29
US08/267,635 US5513260A (en) 1994-06-29 1994-06-29 Method and apparatus for copy protection for various recording media

Publications (1)

Publication Number Publication Date
WO1996000963A1 true WO1996000963A1 (en) 1996-01-11

Family

ID=23019592

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1995/008324 WO1996000963A1 (en) 1994-06-29 1995-06-27 Method and apparatus for copy protection for various recording media

Country Status (8)

Country Link
US (1) US5513260A (en)
EP (1) EP0767957B1 (en)
JP (1) JP4023818B2 (en)
AT (1) ATE204670T1 (en)
AU (1) AU695097B2 (en)
DE (1) DE69522328T2 (en)
DK (1) DK0767957T3 (en)
WO (1) WO1996000963A1 (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1996041468A1 (en) * 1995-06-07 1996-12-19 Macrovision Corporation Method and apparatus for copy protection for various recording media using a video finger print
WO1997016896A1 (en) * 1995-10-30 1997-05-09 Obducat Ab Cryptosystem for optical storage
US5787068A (en) * 1996-11-07 1998-07-28 Imation Corp. Method and arrangement for preventing unauthorized duplication of optical discs using barriers
EP0855837A2 (en) * 1997-01-23 1998-07-29 Sony Corporation Information signal duplication control
US6658568B1 (en) 1995-02-13 2003-12-02 Intertrust Technologies Corporation Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management
US6747930B1 (en) 1996-12-24 2004-06-08 Hide & Seek Technologies, Inc. Data protection on an optical disk
EP1116228B1 (en) * 1998-09-23 2007-01-17 THOMSON multimedia Copy protection method for digital data stored on a medium
EP1889164A2 (en) * 2005-06-03 2008-02-20 Warner Bros. Entertainment Inc. System to ensure that all audio-visual optical disc types are properly screened for watermarks
US7471479B2 (en) 1999-04-09 2008-12-30 Dwight Cavendish Systems Limited System for protection against copying on magnetic tape recorders
US7917749B2 (en) 1995-02-13 2011-03-29 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US7925898B2 (en) 1996-08-12 2011-04-12 Intertrust Technologies Corp. Systems and methods using cryptography to protect secure computing environments
US8019201B2 (en) 2002-06-28 2011-09-13 Dcs Copy Protection Limited Method and apparatus for providing a copy-protected video signal
US8032006B2 (en) 2003-06-05 2011-10-04 Dcs Copy Protection Limited Digital processing disruption systems
US8160423B2 (en) 2004-10-13 2012-04-17 Dcs Copy Protection Limited Audio copy protection system
US8510226B2 (en) 1996-02-26 2013-08-13 Graphon Corporation Method for synchronous encryption between a client and a licensing agent
US8533851B2 (en) 1996-08-30 2013-09-10 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection

Families Citing this family (186)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6516079B1 (en) 2000-02-14 2003-02-04 Digimarc Corporation Digital watermark screening and detecting strategies
US5748763A (en) 1993-11-18 1998-05-05 Digimarc Corporation Image steganography system featuring perceptually adaptive and globally scalable signal embedding
US6757406B2 (en) 1993-11-18 2004-06-29 Digimarc Corporation Steganographic image processing
US6614914B1 (en) 1995-05-08 2003-09-02 Digimarc Corporation Watermark embedder and reader
US6611607B1 (en) 1993-11-18 2003-08-26 Digimarc Corporation Integrating digital watermarks in multimedia content
US6122403A (en) 1995-07-27 2000-09-19 Digimarc Corporation Computer system linked by using information in data objects
US7171016B1 (en) 1993-11-18 2007-01-30 Digimarc Corporation Method for monitoring internet dissemination of image, video and/or audio files
US6944298B1 (en) 1993-11-18 2005-09-13 Digimare Corporation Steganographic encoding and decoding of auxiliary codes in media signals
US6983051B1 (en) 1993-11-18 2006-01-03 Digimarc Corporation Methods for audio watermarking and decoding
US6449377B1 (en) * 1995-05-08 2002-09-10 Digimarc Corporation Methods and systems for watermark processing of line art images
GB9405753D0 (en) * 1994-03-23 1994-05-11 Gms Recordings Limited Interactive compact disk system
JPH07271865A (en) 1994-04-01 1995-10-20 Mitsubishi Corp Method for managing copyright of data base
WO1996005595A1 (en) * 1994-08-08 1996-02-22 Sony Corporation Data recording method, data recording apparatus, disc recording medium, computer system and data copying preventing method
JP3469650B2 (en) * 1994-09-13 2003-11-25 ソニー株式会社 Optical recording medium and signal recording method
US7302415B1 (en) * 1994-09-30 2007-11-27 Intarsia Llc Data copyright management system
JP2970739B2 (en) * 1994-09-30 1999-11-02 日本ビクター株式会社 Optical disc playback control method
JP3503767B2 (en) * 1994-10-21 2004-03-08 日本ビクター株式会社 Optical recording medium
EP0715241B1 (en) 1994-10-27 2004-01-14 Mitsubishi Corporation Apparatus for data copyright management system
US6424715B1 (en) 1994-10-27 2002-07-23 Mitsubishi Corporation Digital content management system and apparatus
KR0152788B1 (en) * 1994-11-26 1998-10-15 이헌조 Copy protecting method and apparatus of digital image system
KR0136458B1 (en) 1994-12-08 1998-05-15 구자홍 Copy protection apparatus of digital magnetic recording and reproducing system
US6009433A (en) * 1995-04-14 1999-12-28 Kabushiki Kaisha Toshiba Information storage and information transmission media with parental control
US5813010A (en) * 1995-04-14 1998-09-22 Kabushiki Kaisha Toshiba Information storage and information transmission media with parental control
US5699427A (en) * 1995-06-23 1997-12-16 International Business Machines Corporation Method to deter document and intellectual property piracy through individualization
US6411725B1 (en) * 1995-07-27 2002-06-25 Digimarc Corporation Watermark enabled video objects
JP3467964B2 (en) * 1995-08-10 2003-11-17 ソニー株式会社 Data recording device and method, data reproducing device and method, recording medium, and data transmission method
US8595502B2 (en) 1995-09-29 2013-11-26 Intarsia Software Llc Data management system
EP0802535B1 (en) * 1995-10-09 2005-06-15 Matsushita Electric Industrial Co., Ltd. Information recording medium, information reproduction apparatus and information reproduction method
JP3176030B2 (en) 1996-01-08 2001-06-11 株式会社東芝 Copy control method and copy control device
EP1798657A3 (en) * 1996-05-15 2011-05-25 Intertrust Technologies Corp Cryptographic apparatus and method for electronic rights management of storage media
US6381341B1 (en) 1996-05-16 2002-04-30 Digimarc Corporation Watermark encoding method exploiting biases inherent in original signal
US5805699A (en) * 1996-05-20 1998-09-08 Fujitsu Limited Software copying system
JP3093678B2 (en) * 1996-06-28 2000-10-03 株式会社東芝 Encryption method, decryption method, recording / reproducing device, decryption device, decryption unit device and recording medium manufacturing method
JPH1021144A (en) 1996-07-03 1998-01-23 Hitachi Ltd Digital writing work distributing system and illegal copy detecting method
SE514352C2 (en) * 1996-07-05 2001-02-12 Ifunga Test Equipment Bv Ways to provide an optical data carrier with identity information
US5933501A (en) 1996-08-01 1999-08-03 Harris Corporation `Virtual` encryption scheme combining different encryption operators into compound-encryption mechanism
US6978370B1 (en) 1996-09-03 2005-12-20 Cryptography Research, Inc. Method and system for copy-prevention of digital copyright works
US5926624A (en) 1996-09-12 1999-07-20 Audible, Inc. Digital information library and delivery system with logic for generating files targeted to the playback device
US7917643B2 (en) * 1996-09-12 2011-03-29 Audible, Inc. Digital information library and delivery system
US6011772A (en) * 1996-09-16 2000-01-04 Spectradisc Corporation Machine-readable optical disc with reading-inhibit agent
TW311999B (en) * 1996-10-16 1997-08-01 Ibm Method of recording media data on recording media, accessing media data and system thereof
US6016348A (en) * 1996-11-27 2000-01-18 Thomson Consumer Electronics, Inc. Decoding system and data format for processing and storing encrypted broadcast, cable or satellite video data
US6081897A (en) * 1997-01-13 2000-06-27 Recording Industry Of America Apparatus for monitoring and preventing unauthorized copying of digital data
US6247131B1 (en) * 1997-03-14 2001-06-12 Fujitsu Limited Information management method and recording medium
US5923754A (en) * 1997-05-02 1999-07-13 Compaq Computer Corporation Copy protection for recorded media
US6167136A (en) * 1997-05-16 2000-12-26 Software Security, Inc. Method for preventing copying of digital video disks
US6381367B1 (en) * 1997-05-29 2002-04-30 Macrovision Corp. Method and apparatus for compression compatible video fingerprinting
KR19990006895A (en) * 1997-06-17 1999-01-25 이데이 노브유끼 Information signal processing device
JPH1173725A (en) * 1997-08-29 1999-03-16 Sony Corp Information signal recording/reproducing system, information recording device, information signal reproducing device and information signal recording/ reproducing method
US6170060B1 (en) * 1997-10-03 2001-01-02 Audible, Inc. Method and apparatus for targeting a digital information playback device
US5978916A (en) * 1997-11-25 1999-11-02 International Business Machines Corporation Method, system and computer program product for updating region-dependent software using a common update module for multiple regions
US6076165A (en) * 1998-01-16 2000-06-13 Sony Corporation Method for authenticating digital recording devices
IL123028A (en) 1998-01-22 2007-09-20 Nds Ltd Protection of data on media recording disks
AU2582299A (en) * 1998-02-11 1999-08-30 Terrence B. Mazer Limited use optical playback device
GB9804766D0 (en) * 1998-03-06 1998-04-29 Mumford Ray CD Copy protection
TW425543B (en) * 1998-04-14 2001-03-11 Hitachi Ltd Data reproduction method and device, data scrambling method, data recording method and device, recorded data reproduction device and the verification method thereof, and semiconductor chip
US6272283B1 (en) 1998-04-22 2001-08-07 Neomagic Corp. Copy-protection for laptop PC by disabling TV-out while viewing protected video on PC display
US6684199B1 (en) 1998-05-20 2004-01-27 Recording Industry Association Of America Method for minimizing pirating and/or unauthorized copying and/or unauthorized access of/to data on/from data media including compact discs and digital versatile discs, and system and data media for same
AU4194199A (en) 1998-05-20 1999-12-06 Recording Industry Association Of America Data disc modulation for minimizing pirating
US6253237B1 (en) * 1998-05-20 2001-06-26 Audible, Inc. Personalized time-shifted programming
US6531262B1 (en) 1998-06-25 2003-03-11 Spectradisc Corporation Methods and apparatus for rendering an optically encoded medium unreadable and tamper-resistant
US6338933B1 (en) 1998-06-25 2002-01-15 Spectradisc Corporation Methods and apparatus for rendering an optically encoded medium unreadable
US6567358B1 (en) 1998-06-26 2003-05-20 Matsushita Electric Industrial Co., Ltd. Information recording/reproducing apparatus
WO2000000348A1 (en) * 1998-06-29 2000-01-06 Recording Industry Association Of America Security marking system and method for minimizing pirating of data on data media
JP3951464B2 (en) * 1998-07-28 2007-08-01 株式会社日立製作所 Digital signal processor
US6226618B1 (en) * 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
US6158005A (en) * 1998-09-10 2000-12-05 Audible, Inc. Cloning protection scheme for a digital information playback device
US8175977B2 (en) 1998-12-28 2012-05-08 Audible License management for digital content
US7088335B2 (en) * 1999-04-28 2006-08-08 Novus Partners Llc Methods and apparatus for ultra-violet stimulated displays
US6424998B2 (en) 1999-04-28 2002-07-23 World Theatre, Inc. System permitting the display of video or still image content on selected displays of an electronic display network according to customer dictates
US6430603B2 (en) * 1999-04-28 2002-08-06 World Theatre, Inc. System for direct placement of commercial advertising, public service announcements and other content on electronic billboard displays
US6430605B2 (en) * 1999-04-28 2002-08-06 World Theatre, Inc. System permitting retail stores to place advertisements on roadside electronic billboard displays that tie into point of purchase displays at stores
JP3977549B2 (en) * 1999-04-30 2007-09-19 株式会社東芝 Content management method, content usage management system, content usage management device, and playback device
US6785815B1 (en) 1999-06-08 2004-08-31 Intertrust Technologies Corp. Methods and systems for encoding and protecting data using digital signature and watermarking techniques
AU777945B2 (en) * 1999-07-12 2004-11-04 Flexplay Technologies, Inc. Disposable optical storage media and manufacturing method
US7885899B1 (en) * 2000-02-08 2011-02-08 Ipass Inc. System and method for secure network purchasing
US7366702B2 (en) * 1999-07-30 2008-04-29 Ipass Inc. System and method for secure network purchasing
US6952685B1 (en) * 1999-08-27 2005-10-04 Ochoa Optics Llc Music distribution system and associated antipiracy protection
US7647618B1 (en) * 1999-08-27 2010-01-12 Charles Eric Hunter Video distribution system
US7370016B1 (en) 1999-08-27 2008-05-06 Ochoa Optics Llc Music distribution systems
US8090619B1 (en) * 1999-08-27 2012-01-03 Ochoa Optics Llc Method and system for music distribution
US6647417B1 (en) 2000-02-10 2003-11-11 World Theatre, Inc. Music distribution systems
US20020056118A1 (en) * 1999-08-27 2002-05-09 Hunter Charles Eric Video and music distribution system
US7209900B2 (en) * 1999-08-27 2007-04-24 Charles Eric Hunter Music distribution systems
US8656423B2 (en) 1999-08-27 2014-02-18 Ochoa Optics Llc Video distribution system
US6928551B1 (en) 1999-10-29 2005-08-09 Lockheed Martin Corporation Method and apparatus for selectively denying access to encoded data
JP2001210013A (en) * 1999-11-15 2001-08-03 Hitachi Ltd Data reproducing device
US7082413B2 (en) * 1999-11-24 2006-07-25 International Business Machines Corporation System and method for authorized compression of digitized music
IL133236A0 (en) * 1999-11-30 2001-03-19 Ttr Technologies Ltd Copy-protected digital audio compact disc and method and system for producing same
CN1434956A (en) * 1999-12-17 2003-08-06 世界剧院公司 System and method permitting customer ordering produsts from provider
US6850901B1 (en) 1999-12-17 2005-02-01 World Theatre, Inc. System and method permitting customers to order products from multiple participating merchants
CN1257508C (en) * 1999-12-28 2006-05-24 松下电器产业株式会社 Recording apparatus, reproducing apparatus, data processing apparatus, recording/reproducing apparatus, and data transmitting apparatus
US9252898B2 (en) 2000-01-28 2016-02-02 Zarbaña Digital Fund Llc Music distribution systems
US6715122B2 (en) 2000-02-23 2004-03-30 Doug Carson & Associates, Inc. Copy protection through symbol substitution and induced errors
SG97852A1 (en) 2000-02-25 2003-08-20 Kent Ridge Digital Labs Method and apparatus for digital content copy protection
JP4348818B2 (en) * 2000-03-10 2009-10-21 ソニー株式会社 Data distribution system and method, and data recording medium
US7245719B2 (en) * 2000-06-30 2007-07-17 Matsushita Electric Industrial Co., Ltd. Recording method and apparatus, optical disk, and computer-readable storage medium
US7124944B2 (en) * 2000-06-30 2006-10-24 Verification Technologies, Inc. Product packaging including digital data
US6638593B2 (en) * 2000-06-30 2003-10-28 Verification Technologies, Inc. Copy-protected optical media and method of manufacture thereof
AU2001259033A1 (en) 2000-06-30 2002-01-14 Verification Technologies, Inc. Copy-protected optical media and method of manufacture thereof
US20050063256A1 (en) * 2000-06-30 2005-03-24 Selinfreund Richard H. Data storage in optical discs
US7660415B2 (en) * 2000-08-03 2010-02-09 Selinfreund Richard H Method and apparatus for controlling access to storage media
WO2002023904A1 (en) * 2000-09-13 2002-03-21 Certia Inc. Systems and methods for controlling use of creative works
JP2002093047A (en) * 2000-09-20 2002-03-29 Sony Corp Data recording medium, data recording device and method, data output device and method, data display method, content data as well as data reproducing device and method
US7054256B2 (en) * 2000-10-20 2006-05-30 Ochoa Optics Llc High capacity digital data storage by transmission of radiant energy through arrays of small diameter holes
US8032542B2 (en) * 2000-10-26 2011-10-04 Reynolds Mark L Creating, verifying, managing, and using original digital files
EP1207527A1 (en) * 2000-11-17 2002-05-22 Deutsche Thomson-Brandt Gmbh Method and apparatus for determining main parameter values of a storage medium that are required for replaying said storage medium
US6959090B1 (en) * 2000-11-20 2005-10-25 Nokia Corporation Content Protection scheme for a digital recording device
US6716589B2 (en) 2000-11-20 2004-04-06 Alphabeta Ab Discordant helix stabilization for prevention of amyloid formation
US6925342B2 (en) * 2000-12-05 2005-08-02 Koninklijke Philips Electronics N.V. System and method for protecting digital media
US20020073317A1 (en) * 2000-12-08 2002-06-13 Philips Electronics North America Corporation. System and method for protecting digital media
US6982109B2 (en) * 2000-12-11 2006-01-03 Flexplay Technologies, Inc. Method for rendering surface layer of limited play disk lightfast
CA2434538A1 (en) * 2000-12-14 2002-10-17 Ecd Systems, Inc. Systems and methods for optical media modification
US20020112235A1 (en) * 2001-02-12 2002-08-15 Ballou Bernard L. Video distribution system
US20020112243A1 (en) * 2001-02-12 2002-08-15 World Theatre Video distribution system
US8112311B2 (en) 2001-02-12 2012-02-07 Ochoa Optics Llc Systems and methods for distribution of entertainment and advertising content
US7987510B2 (en) * 2001-03-28 2011-07-26 Rovi Solutions Corporation Self-protecting digital content
US20020141582A1 (en) * 2001-03-28 2002-10-03 Kocher Paul C. Content security layer providing long-term renewable security
US7177261B2 (en) * 2001-06-05 2007-02-13 Flexplay Technologies, Inc. Limited play optical devices with interstitial reactive layer and methods of making same
US20060064594A1 (en) * 2001-06-06 2006-03-23 Spectra Systems Corp. Absorptive coating on a disc to create a reflective modulation for encryption
US7979914B2 (en) * 2001-06-25 2011-07-12 Audible, Inc. Time-based digital content authorization
JP2005504995A (en) * 2001-06-29 2005-02-17 ノーヴァス・コミュニケーション・テクノロジーズ・インコーポレイテッド Dynamic bulletin board advertising device and dynamic bulletin board advertising method
US7098869B2 (en) * 2001-06-29 2006-08-29 Novus Partners Llc Business method for billboard advertising
US7098870B2 (en) * 2001-06-29 2006-08-29 Novus Partners Llc Advertising method for dynamic billboards
US7015875B2 (en) * 2001-06-29 2006-03-21 Novus Partners Llc Dynamic device for billboard advertising
US7088352B2 (en) * 2002-06-19 2006-08-08 Novus Partners Llc Dynamic device and method for dispensing machines
CN1311456C (en) * 2001-07-19 2007-04-18 皇家菲利浦电子有限公司 Apparatus and method for reproducing user data
JP3678181B2 (en) * 2001-08-08 2005-08-03 ソニー株式会社 REPRODUCTION DEVICE AND METHOD, AND DISC REPRODUCTION DEVICE
US7562396B2 (en) * 2001-08-21 2009-07-14 Ecd Systems, Inc. Systems and methods for media authentication
US20030042998A1 (en) * 2001-08-24 2003-03-06 Edmonson Peter J. Leaky surface acoustic wave resonators
US20030056106A1 (en) * 2001-09-07 2003-03-20 Wang Sheng E. Encryption system for preventing data from being copied illegally and method of the same
US7960005B2 (en) * 2001-09-14 2011-06-14 Ochoa Optics Llc Broadcast distribution of content for storage on hardware protected optical storage media
JP4020077B2 (en) * 2001-09-14 2007-12-12 ソニー株式会社 Recording medium reproducing method and reproducing apparatus, and recording medium recording method and recording apparatus
US7233781B2 (en) 2001-10-10 2007-06-19 Ochoa Optics Llc System and method for emergency notification content delivery
US20030088773A1 (en) * 2001-11-07 2003-05-08 Koninklijke Philips Electronics N. V. Method of and apparatus for preventing illicit copying of digital content
US7302575B2 (en) * 2001-11-07 2007-11-27 Koninklijke Philips Electronics N.V. Apparatus for and method of preventing illicit copying of digital content
US6952479B2 (en) * 2001-11-27 2005-10-04 Macrovision Europe Limited Dynamic copy protection of optical media
US7562397B1 (en) 2002-02-27 2009-07-14 Mithal Ashish K Method and system for facilitating search, selection, preview, purchase evaluation, offering for sale, distribution, and/or sale of digital content and enhancing the security thereof
US7316032B2 (en) * 2002-02-27 2008-01-01 Amad Tayebi Method for allowing a customer to preview, acquire and/or pay for information and a system therefor
US7716485B2 (en) 2002-02-01 2010-05-11 Sca Ipla Holdings Inc. Systems and methods for media authentication
US20050111661A1 (en) 2002-02-01 2005-05-26 Arie Wijnen Anti-copy protection for a video signal
US20050084645A1 (en) * 2002-02-07 2005-04-21 Selinfreund Richard H. Method and system for optical disc copy-protection
EP1504446B1 (en) * 2002-05-01 2011-06-29 LG Electronics, Inc. High-density read-only optical disc, and optical disc apparatus and method using the same background of the invention
US20030217271A1 (en) * 2002-05-15 2003-11-20 Sun Microsystems, Inc. Use of smart card technology in the protection of fixed storage entertainment assets
US20040254890A1 (en) * 2002-05-24 2004-12-16 Sancho Enrique David System method and apparatus for preventing fraudulent transactions
EP2270783A3 (en) * 2002-07-02 2013-05-29 LG Electronics Inc. High-density optical disc and method for restricting playback of the high-density optical disc in optical disc apparatus
US7096187B1 (en) 2002-07-23 2006-08-22 Harris Scott C Compressed audio information
US20040052203A1 (en) * 2002-09-13 2004-03-18 Brollier Brian W. Light enabled RFID in information disks
JP2006501547A (en) * 2002-09-26 2006-01-12 ベリフィケーション テクノロジーズ インコーポレーション Product certification using temporary optical state change materials
US20040103115A1 (en) * 2002-11-26 2004-05-27 Vandewater Eric J. System and method of protecting digital content
US20040153442A1 (en) * 2003-02-04 2004-08-05 Mantz Brian D. Method and apparatus to generate a controlled copy of information stored on an optical storage media
US20060203700A1 (en) * 2003-02-06 2006-09-14 Verification Technologies, Inc. Method and system for optical disk copy-protection
CN1757061A (en) * 2003-02-12 2006-04-05 道格卡森联合公司 Recordable medium having a data recording area with an embedded non-recordable zone
WO2004075193A1 (en) * 2003-02-19 2004-09-02 Lg Electronics Inc. Recording medium, apparatus for forming the recording medium, and apparatus and method for reproducing the recording medium
KR101051000B1 (en) * 2003-02-19 2011-07-26 엘지전자 주식회사 High Density Optical Discs and the Illegal Copy Determination Method
KR100499586B1 (en) 2003-05-20 2005-07-07 엘지전자 주식회사 Method for managing a copy protection information of high density optical disc and high density optical disc therof and apparatus for detecting a copy protection information
CA2527668A1 (en) * 2003-06-02 2004-12-16 Liquid Machines, Inc. Managing data objects in dynamic, distributed and collaborative contexts
CN101241735B (en) 2003-07-07 2012-07-18 罗威所罗生股份有限公司 Method for replaying encrypted video and audio content
JP2005038488A (en) * 2003-07-18 2005-02-10 Teac Corp Optical disk device
JP2005109102A (en) * 2003-09-30 2005-04-21 Mitsubishi Electric Corp Monolithic semiconductor laser and manufacturing method thereof
US20050078822A1 (en) * 2003-10-08 2005-04-14 Eyal Shavit Secure access and copy protection management system
KR100594235B1 (en) * 2003-12-16 2006-06-30 삼성전자주식회사 Method for detecting optical disc processed reproduction protection
US7664966B2 (en) 2004-05-17 2010-02-16 Microsoft Corporation Secure storage on recordable medium in a content protection system
US20060023598A1 (en) * 2004-07-30 2006-02-02 Babinski James P Method and apparatus for protecting against copying of content recorded on optical recording media
DE102004046618A1 (en) * 2004-09-25 2006-03-30 Robert Bosch Gmbh Circuit arrangement for analog / digital conversion
JP4734960B2 (en) * 2005-02-25 2011-07-27 ソニー株式会社 Information processing apparatus, information recording medium, information processing method, and computer program
KR100708162B1 (en) * 2005-04-25 2007-04-16 삼성전자주식회사 Method for managing a domain and apparatus therefor
US8161296B2 (en) * 2005-04-25 2012-04-17 Samsung Electronics Co., Ltd. Method and apparatus for managing digital content
US7281652B2 (en) * 2005-05-18 2007-10-16 Foss Jonathan G Point-of-sale provider evaluation
CN101310335B (en) 2005-11-14 2011-02-09 皇家飞利浦电子股份有限公司 Hybrid optical disc
US7330328B2 (en) * 2006-02-17 2008-02-12 Seagate Technology Llc Random number generation using back electromotive force (BEMF) values
US8452988B2 (en) * 2006-07-24 2013-05-28 Michael Sujue Wang Secure data storage for protecting digital content
EP2062056B1 (en) * 2006-09-29 2019-04-10 Luminex Corporation Differentiation of flow cytometry pulses and applications
US7926731B2 (en) 2006-12-22 2011-04-19 International Business Machines Corporation Protected storage of data on optically-readable media
EP2321964B1 (en) 2008-07-25 2018-12-12 Google LLC Method and apparatus for detecting near-duplicate videos using perceptual video signatures
US8381310B2 (en) 2009-08-13 2013-02-19 Sling Media Pvt. Ltd. Systems, methods, and program applications for selectively restricting the placeshifting of copy protected digital media content
US10474745B1 (en) 2016-04-27 2019-11-12 Google Llc Systems and methods for a knowledge-based form creation platform
US11039181B1 (en) 2016-05-09 2021-06-15 Google Llc Method and apparatus for secure video manifest/playlist generation and playback
US10750248B1 (en) 2016-05-10 2020-08-18 Google Llc Method and apparatus for server-side content delivery network switching
US10750216B1 (en) 2016-05-10 2020-08-18 Google Llc Method and apparatus for providing peer-to-peer content delivery
US10595054B2 (en) 2016-05-10 2020-03-17 Google Llc Method and apparatus for a virtual online video channel
US10771824B1 (en) 2016-05-10 2020-09-08 Google Llc System for managing video playback using a server generated manifest/playlist
US10785508B2 (en) 2016-05-10 2020-09-22 Google Llc System for measuring video playback events using a server generated manifest/playlist
US11069378B1 (en) 2016-05-10 2021-07-20 Google Llc Method and apparatus for frame accurate high resolution video editing in cloud using live video streams
US11032588B2 (en) 2016-05-16 2021-06-08 Google Llc Method and apparatus for spatial enhanced adaptive bitrate live streaming for 360 degree video playback
CN111291653B (en) * 2020-01-21 2023-06-16 Oppo(重庆)智能科技有限公司 Fingerprint event reporting method and device and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4405829A (en) * 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
JPS62205580A (en) * 1986-03-05 1987-09-10 Hitachi Ltd Disk and data protection system using same
EP0492692A2 (en) * 1990-12-20 1992-07-01 Delco Electronics Corporation Remote accessing system
EP0545472A1 (en) * 1991-12-02 1993-06-09 Koninklijke Philips Electronics N.V. Closed information system with physical copy protection

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4670857A (en) * 1981-10-26 1987-06-02 Rackman Michael I Cartridge-controlled system whose use is limited to authorized cartridges
US4785361A (en) * 1982-11-08 1988-11-15 Vault Corporation Method and apparatus for frustrating the unauthorized copying of recorded data
US4891504A (en) * 1985-06-17 1990-01-02 Digicomp Research Corp. Security level identification method for computer based information
US4866769A (en) * 1987-08-05 1989-09-12 Ibm Corporation Hardware assist for protecting PC software
JPH02293930A (en) * 1989-05-08 1990-12-05 Victor Co Of Japan Ltd Preventing system for stealing of recording contents of recording medium
JPH03214834A (en) * 1990-01-19 1991-09-20 Canon Inc Multi-medium network system
US5418852A (en) * 1992-03-18 1995-05-23 Fujitsu Limited Unauthorized use prevention method for optical disks, optical disk having unauthorized use prevention function, and optical disk apparatus
US5412718A (en) * 1993-09-13 1995-05-02 Institute Of Systems Science Method for utilizing medium nonuniformities to minimize unauthorized duplication of digital information

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4405829A (en) * 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
JPS62205580A (en) * 1986-03-05 1987-09-10 Hitachi Ltd Disk and data protection system using same
EP0492692A2 (en) * 1990-12-20 1992-07-01 Delco Electronics Corporation Remote accessing system
EP0545472A1 (en) * 1991-12-02 1993-06-09 Koninklijke Philips Electronics N.V. Closed information system with physical copy protection

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"In-band delivery of scrambling keys in fixed format data", IBM TECHNICAL DISCLOSURE BULLETIN, vol. 33, no. 3a, pages 236 - 238, XP000123919 *
ASAEL DROR: "Secret Codes", BYTE, vol. 14, no. 6, pages 267 - 270 *
PATENT ABSTRACTS OF JAPAN vol. 12, no. 66 (P - 671) 27 February 1988 (1988-02-27) *

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7917749B2 (en) 1995-02-13 2011-03-29 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US6658568B1 (en) 1995-02-13 2003-12-02 Intertrust Technologies Corporation Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management
US8543842B2 (en) 1995-02-13 2013-09-24 Intertrust Technologies Corporation System and methods for secure transaction management and electronics rights protection
WO1996041468A1 (en) * 1995-06-07 1996-12-19 Macrovision Corporation Method and apparatus for copy protection for various recording media using a video finger print
WO1997016896A1 (en) * 1995-10-30 1997-05-09 Obducat Ab Cryptosystem for optical storage
US6125183A (en) * 1995-10-30 2000-09-26 Obducat Ab Cryptosystem for optical storage
US8510226B2 (en) 1996-02-26 2013-08-13 Graphon Corporation Method for synchronous encryption between a client and a licensing agent
US7925898B2 (en) 1996-08-12 2011-04-12 Intertrust Technologies Corp. Systems and methods using cryptography to protect secure computing environments
US8533851B2 (en) 1996-08-30 2013-09-10 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US5787068A (en) * 1996-11-07 1998-07-28 Imation Corp. Method and arrangement for preventing unauthorized duplication of optical discs using barriers
US6747930B1 (en) 1996-12-24 2004-06-08 Hide & Seek Technologies, Inc. Data protection on an optical disk
EP0855837A2 (en) * 1997-01-23 1998-07-29 Sony Corporation Information signal duplication control
US6449425B1 (en) 1997-01-23 2002-09-10 Sony Corporation Information signal output control method, information signal duplication prevention method, information signal duplication prevention device, and information signal recording medium
EP0855837A3 (en) * 1997-01-23 1999-03-03 Sony Corporation Information signal duplication control
US7631358B1 (en) 1998-09-23 2009-12-08 Thomson Licensing Copy protection method for digital data stored on a medium
US8074285B2 (en) 1998-09-23 2011-12-06 Thomson Licensing Copy protection method for digital data stored on a medium
EP1116228B1 (en) * 1998-09-23 2007-01-17 THOMSON multimedia Copy protection method for digital data stored on a medium
US7471479B2 (en) 1999-04-09 2008-12-30 Dwight Cavendish Systems Limited System for protection against copying on magnetic tape recorders
US8019201B2 (en) 2002-06-28 2011-09-13 Dcs Copy Protection Limited Method and apparatus for providing a copy-protected video signal
US9264657B2 (en) 2002-06-28 2016-02-16 Dcs Copy Protection Limited Method and apparatus for providing a copy-protected video signal
US8032006B2 (en) 2003-06-05 2011-10-04 Dcs Copy Protection Limited Digital processing disruption systems
US8837909B2 (en) 2003-06-05 2014-09-16 Dcs Copy Protection Ltd. Digital processing disruption systems
US8160423B2 (en) 2004-10-13 2012-04-17 Dcs Copy Protection Limited Audio copy protection system
US8639092B2 (en) 2004-10-13 2014-01-28 Dcs Copy Protection Limited Audio copy protection system
EP1889164A4 (en) * 2005-06-03 2010-10-27 Warner Bros Entertainment Inc System to ensure that all audio-visual optical disc types are properly screened for watermarks
AU2006255207B2 (en) * 2005-06-03 2011-11-03 Warner Bros. Entertainment Inc. System to ensure that all audio-visual optical disc types are properly screened for watermarks
EP1889164A2 (en) * 2005-06-03 2008-02-20 Warner Bros. Entertainment Inc. System to ensure that all audio-visual optical disc types are properly screened for watermarks

Also Published As

Publication number Publication date
AU2956895A (en) 1996-01-25
DK0767957T3 (en) 2001-10-08
ATE204670T1 (en) 2001-09-15
AU695097B2 (en) 1998-08-06
EP0767957B1 (en) 2001-08-22
JPH10502479A (en) 1998-03-03
US5513260A (en) 1996-04-30
DE69522328D1 (en) 2001-09-27
JP4023818B2 (en) 2007-12-19
DE69522328T2 (en) 2002-06-27
EP0767957A1 (en) 1997-04-16

Similar Documents

Publication Publication Date Title
AU695097B2 (en) Method and apparatus for copy protection for various recording media
US5659613A (en) Method and apparatus for copy protection for various recording media using a video finger print
EP1282899B1 (en) Copy protection system
EP0906700B1 (en) Method and system for transferring content information and supplemental information relating thereto
JP5362675B2 (en) Key distribution by memory device
US6957343B2 (en) Validating keying material by using a validation area of read-only media to prevent playback of unauthorized copies of content stored on the media
WO1997043853A1 (en) Method and apparatus for copy protection of copyrighted material on various recording media
RU2361293C2 (en) Method of managing information for record medium copyprotection
KR19990014676A (en) Video media protection and tracking system
JP2004507017A (en) Method and apparatus for controlling distribution and use of digital creations
WO1995028704A1 (en) Method and apparatus for preventing illegal copying and illegal installation of information on optical recording medium
WO2006044301A2 (en) Method and apparatus for dvd copy protection with selective data pattern insertion
EP1393317B1 (en) Encryption and decryption of data on a record carrier
RU2361292C2 (en) Method of managing information for record medium copyprotection
JP2006011682A (en) Information recording medium verification device, information recording medium verification method and computer program
TW295656B (en)
JPH08339629A (en) Illegal copy preventing apparatus, recorder, reproducer and recording medium
KR20020073810A (en) Storage Medium for protecting its contents, and method and apparatus for recording and reproducing thereon
KR100556731B1 (en) Encryption recording/playing apparatus and method for disk
Simmins Anticopy measures for broadcast video and computer games
MXPA97009578A (en) Method and apparatus for the protection against copy in different means of registration, using unahuella de vi
JP2002184098A (en) Recording medium, recording device, reproducing device, and recording/reproducing method
WO2005045826A1 (en) Method and system of decrypting disc

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AM AT AU BB BG BR BY CA CH CN CZ DE DK EE ES FI GB GE HU IS JP KE KG KP KR KZ LK LR LT LU LV MD MG MN MW MX NO NZ PL PT RO RU SD SE SG SI SK TJ TM TT UA UG UZ VN

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): KE MW SD SZ UG AT BE CH DE DK ES FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 1995925437

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1995925437

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWG Wipo information: grant in national office

Ref document number: 1995925437

Country of ref document: EP